Computer Misuse Act Quiz

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Collegeprof101
C
Collegeprof101
Community Contributor
Quizzes Created: 1 | Total Attempts: 533
Questions: 15 | Attempts: 533

SettingsSettingsSettings
Computer Misuse Act Quiz - Quiz


Questions and Answers
  • 1. 

    Is the creation of viruses specifically prohibited under the Computer Misuse Act?

    • A.

      No, viruses are not mentioned in the Act

    • B.

      Yes because viruses are harmful

    • C.

      Yes because viruses slow down computers

    • D.

      No, viruses are only prohibited when the cause (or intend to cause) impairment of a computer

    Correct Answer
    D. No, viruses are only prohibited when the cause (or intend to cause) impairment of a computer
    Explanation
    The Act doesn't prohibit the creation of viruses, or indeed using them on equipment/data with the owners permission. However if the virus does access or modify data or impair a computer without authorisation it becomes illegal

    Rate this question:

  • 2. 

    Using a Computer to access data without authorisation is covered by which section of the Computer Misuse Act?

    • A.

      Section 1

    • B.

      Section 2

    • C.

      Section 3

    • D.

      Section 3ZA

    Correct Answer
    A. Section 1
    Explanation
    Section 1 is all about accessing data without authorisation

    Rate this question:

  • 3. 

    Someone uses a laptop as a hammer to destroy a Hard Drive containing sensitive data, could they be convicted under the Computer Misuse Act?

    • A.

      It would depend on whether they were authorised to access the data on the Hard Drive

    • B.

      Yes, this is using computer equipment for modification of data

    • C.

      No, physical damage isn't covered by the Act

    • D.

      It would depend on whether they were authorised to modify the data on the Hard Drive

    Correct Answer
    C. No, physical damage isn't covered by the Act
    Explanation
    The physical damage is still covered by the Criminal Damage Act. The CMA only deals with alteration, impairment or deletion of data.

    Rate this question:

  • 4. 

    A security tester, based in the UK, who tests computer security by attempting to hack into them is committing an offence under the Computer Misuse Act if...

    • A.

      He is authorised to attempt to gain access to they systems

    • B.

      The computer he used and the computer attacked aren't in the UK

    • C.

      He uses the access he gained to commit a further crime

    • D.

      He doesn't test the system properly

    Correct Answer
    C. He uses the access he gained to commit a further crime
    Explanation
    Section 2 of the Act states that any access to computer programs or data which is done with the intent to commit further crimes is illegal.

    Rate this question:

  • 5. 

    To be guilty of the offence in section 1 of the Computer Misuse Act 1990 what must a defendant cause a computer to do?

    • A.

      Allow access to data without permission

    • B.

      Commit a fraud

    • C.

      Perform a function

    • D.

      Obtain money

    Correct Answer
    A. Allow access to data without permission
    Explanation
    The s.1 offence (hacking) is accessing data without authorisation on a computer

    Rate this question:

  • 6. 

    A person is convicted of accessing the LSE network and modifying their grades in the student records, what is the maximum penalty they face?

    • A.

      Up to six months in prison and a fine of up to £5000

    • B.

      Up to 10 years in prison and an unlimited fine

    • C.

      Up to 5 years in prison and an unlimited fine

    • D.

      Up to 12 months in prison and a fine of up to £5000

    Correct Answer
    B. Up to 10 years in prison and an unlimited fine
    Explanation
    This is an offence under s.3(2)(c) of the Act "to impair the operation of any such program or the reliability of any such data" This carries an up to 10 year sentence.

    Rate this question:

  • 7. 

    Is there following statement correct and why?"System administrators have a legal obligation (as part of this act) to protect their systems from hackers"

    • A.

      True, sysadmins are required to do all they can to protect data

    • B.

      False, the Act has no such obligation

    • C.

      False, the Act doesn't specifically mention hacking

    • D.

      True, sysadmins are required to stop hackers at all costs

    Correct Answer
    B. False, the Act has no such obligation
    Explanation
    This is beyond the scope of the Act but may be covered under some contract law

    Rate this question:

  • 8. 

    A person installs a new piece of software on their own computer which subsequently slows it down impairing their use of it. Could the software manufacturer be prosecuted under the Computer Misuse Act?

    • A.

      No, the act doesn't cover consumer software.

    • B.

      Yes, the software has impaired the operation of the computer so s.3 applies

    • C.

      Yes, the user didn't give the software permission slow down their computer

    • D.

      No, the user gave authorisation for the software to be installed and run therefore the Act does not apply

    Correct Answer
    D. No, the user gave authorisation for the software to be installed and run therefore the Act does not apply
    Explanation
    This law deals with unauthorised access, modification and impairment only. Not authorised actions.

    Rate this question:

  • 9. 

    Where does the Computer Misuse Act 1990 apply?

    • A.

      The EU

    • B.

      The UK

    • C.

      Globally

    • D.

      England & Wales

    Correct Answer
    B. The UK
    Explanation
    Although the Act can regulate actions which have effects overseas the territorial scope of the UK is to the UK only.

    Rate this question:

  • 10. 

    A friend often comes to your house and will use your tablet computer when you are out of the room. You tell her that she is not allowed to do that even though the tablet is not password protected. The next time she comes over she again uses your tablet when you are out of the room. Has she committed an offence under the CMA?

    • A.

      No, you should have password protected your tablet.

    • B.

      Yes, this is an unauthorised modification of your data

    • C.

      Yes, this is an unauthorised access to your tablet and its data

    • D.

      No, if you invite her into your home she has an implied right to access your tablet

    Correct Answer
    C. Yes, this is an unauthorised access to your tablet and its data
    Explanation
    This is essentially Ellis v DPP. As soon as you told your friend she was not entitled to do this whe was put on notice that her access was unauthorised.

    Rate this question:

  • 11. 

    You work as a journalist for a local newspaper. One day someone files a story saying Andy Murray (the great tennis player, not law professor) is in town. You really want to meet him and get his autograph so you look at the story details filed on your employer's database to see where he is staying. Have you committed an offence?

    • A.

      Yes, this is a breach of s.1 of the Act

    • B.

      Yes, this is a breach of s.2 of the Act

    • C.

      No, this is access of a type which is generally authorised to you

    • D.

      No, the Act is not engaged at all

    Correct Answer
    A. Yes, this is a breach of s.1 of the Act
    Explanation
    This is based upon Bignall and Allison. Allison overruled the Bignall authorised access for an unauthorised purpose defence. It is not s.2 as an autograph is not a further offence.

    Rate this question:

  • 12. 

    Where could Gary MacKinnon have been tried?

    • A.

      Anywhere that is a signatory of the Cybercrime Convention

    • B.

      Only the UK

    • C.

      Only the US

    • D.

      Either the UK or the US

    Correct Answer
    D. Either the UK or the US
    Explanation
    He could be tried under s4(1)(b) in England & Wales (the UK is of course not a single jurisdiction) and he could have been tried under Federal Laws in the US.

    Rate this question:

  • 13. 

    A poorly constructed mailserver goes a little crazy and sends 100,000 messages to [email protected]. This causes the LSE mailserver to fail. Is there a possible CMA offence?

    • A.

      Yes, under s.3

    • B.

      Yes, under s3A

    • C.

      No, there is no intent

    • D.

      No, mail servers permit the sending of mail in this fashion so it was authorised

    Correct Answer
    A. Yes, under s.3
    Explanation
    Even though there was no intent this could be seen to be reckless under s.3(3)

    Rate this question:

  • 14. 

    A hacker group attacks the webpage of 10 Downing Street and occupies it using a DDoS attack. They issue a statement that this was done to protest the UK's climate change policy. Have they a defence against any charges under s.3 of the CMA?

    • A.

      Yes, this is protected political speech under s.3(5)(d)

    • B.

      No, these acts do not meet the political speech defence in s.3(5)(d)

    • C.

      Yes, the Act has a general defence for political hacktivism

    • D.

      No, there is no defence for hacktivist speech

    Correct Answer
    D. No, there is no defence for hacktivist speech
    Explanation
    Firstly, there is no s.3(5)(d). Secondly there are no defences for hacktivists.

    Rate this question:

  • 15. 

    A friend accesses the LSE's servers to find the home address of another student as they are obsessed with them and want to get their address to "stalk" them. They then find the LSE servers do not have the home address of students so this was a waste of time. What offence if any have they committed?

    • A.

      No offence. As the information they sought was not there there is no offence

    • B.

      Section 2 offence. Access with intent to commit another offence

    • C.

      Section 1 offence. Unauthorised access but they could not commit a further offence (impossible)

    • D.

      No offence. Students are allowed to use the LSE system

    Correct Answer
    B. Section 2 offence. Access with intent to commit another offence
    Explanation
    This is a s.2 offence, even though the further offence could not actually be committed in this fashion - see s.2(3). Also stalking is covered as it has a potential 5 year prison sentence.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 15, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Feb 27, 2017
    Quiz Created by
    Collegeprof101
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.